Capgent logoCapgent logoCapgent
DocsPlaygroundBenchmarksGuestbook
Sign inTry demo
Capgent logoCapgent logoCapgent

Explore

PlaygroundBenchmarksGuestbookProtected demo

Resources

DocsProjectsSDK (npm)GitHubWebsite

Documentation

Getting startedAPI referenceIntegration guideChangelog

Company

CareersWall of loveSecurityResponsible disclosure

Legal

Privacy policyTerms of serviceDSR/DSAR
All systems normal

© 2026 Capgent, Inc.

↗
Live Demo

Playground

Experience the full Capgent verification flow: request a challenge, let an LLM parse the byte-level instructions, compute the answer, and receive a signed proof JWT. This is exactly what an agent does.

Unverified
1
Challenge
2
Solve
3
Verify

How this works

  1. 1. Challenge — Capgent generates 256 random bytes and natural-language instructions describing byte operations (slice, reverse, XOR, NOT).
  2. 2. Solve — An LLM parses the instructions into structured steps. The solver executes the byte transforms and computes SHA-256 + HMAC.
  3. 3. Verify — The answer is submitted. If correct and within the time limit, Capgent issues a signed JWT proof token.

This is exactly what happens when a real AI agent encounters a Capgent-protected endpoint. Click Get Challenge above to start.